The post Bitrefill reports Lazarus-style exploit drained funds and exposed some user data appeared on BitcoinEthereumNews.com. Bitrefill, the established cryptoThe post Bitrefill reports Lazarus-style exploit drained funds and exposed some user data appeared on BitcoinEthereumNews.com. Bitrefill, the established crypto

Bitrefill reports Lazarus-style exploit drained funds and exposed some user data

For feedback or concerns regarding this content, please contact us at crypto.news@mexc.com

Bitrefill, the established crypto-to-gift-card platform, was hit by a sophisticated cyberattack earlier this month that drained company funds and exposed some customer data.

The team disclosed the incident in an X article on Tuesday, saying that it shares strong similarities with operations linked to Lazarus Group, the notorious North Korean cybercrime collective believed to be responsible for billions of dollars in crypto thefts.

According to Bitrefill, the breach happened on March 1, when attackers gained access to an employee’s device and extracted a legacy login credential.

From there, they used that foothold to pull production secrets and move deeper into Bitrefill’s infrastructure, escalating privileges until they reached parts of its database and certain crypto wallets.

Bitrefill first detected the intrusion after noticing unusual purchasing activity from suppliers.

The company discovered that its gift card inventory and supply chains had been exploited alongside wallet drains. Upon identifying the breach, Bitrefill took all systems offline as part of its containment protocol.

Scope of data exposure

The breach affected about 18,500 purchase records, including customer email addresses, crypto payment addresses, and metadata such as IP addresses.

Roughly 1,000 transactions involved products that required customer names. While that information was encrypted, it may have been exposed if attackers accessed the encryption keys. Bitrefill said it has notified affected customers.

The company said customer-held gift cards, store credits, and account balances were not impacted. It also noted that it does not require mandatory know-your-customer checks, and any KYC data submitted for higher purchase limits is handled by an external provider, not stored on its systems.

Investigators found multiple signs linking the attack to the Lazarus Group and its affiliate Bluenoroff, including malware similarities, blockchain tracing patterns, and reused IP and email infrastructure tied to earlier crypto breaches.

Bitrefill said it worked with security firms and law enforcement in responding to the incident.

Bitrefill plans to cover the financial losses caused by the attack using its operational capital. The platform has restored most functions, including payments, inventory, and customer accounts, with sales volumes returning to pre-incident levels.

The company said it is strengthening its security posture through additional penetration testing, tighter access controls, improved logging and monitoring, and updated incident response procedures, including automated shutdown protocols.

Disclosure: This article was edited by Vivian Nguyen. For more information on how we create and review content, see our Editorial Policy.

Source: https://cryptobriefing.com/bitrefill-cyberattack-user-data-exposed/

Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact crypto.news@mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.